US20220060983A1 - Technologies for associating an offline wi-fi system with a wireless access point - Google Patents
Technologies for associating an offline wi-fi system with a wireless access point Download PDFInfo
- Publication number
- US20220060983A1 US20220060983A1 US17/223,842 US202117223842A US2022060983A1 US 20220060983 A1 US20220060983 A1 US 20220060983A1 US 202117223842 A US202117223842 A US 202117223842A US 2022060983 A1 US2022060983 A1 US 2022060983A1
- Authority
- US
- United States
- Prior art keywords
- access control
- wireless communication
- control device
- circuitry
- power state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
- H04W52/0229—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3234—Power saving characterised by the action undertaken
- G06F1/3243—Power saving in microcontroller unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0261—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
- H04W52/0274—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof
- H04W52/028—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof switching on or off only a part of the equipment circuit blocks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00365—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit
- G07C2009/00373—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit whereby the wake-up circuit is situated in the lock
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00793—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- the IEEE 802.11 standard outlines specific protocols for implementing Wi-Fi-based wireless local area network (WLAN) communications.
- the Bluetooth Special Interest Group (SIG) develops and outlines the standards for implementing Bluetooth communication.
- a wireless network station device initiates the connection to a wireless access point, which is in contrast to a Bluetooth network, in which the central device initiates the connection to a peripheral device.
- a wireless network station device needs to communicate via the Internet, it must already be associated with a wireless access point.
- Power-sensitive Wi-Fi devices generally disassociate from provisioned access points when there is no data to transfer over a network and, therefore, some trigger is generally needed to cause the device to re-associate with the access point. For example, a user typically must physically interact with a station (e.g., via a mechanical button) to initiate the station to connection to a wireless access point.
- One embodiment is directed to a unique system, components, and methods for associating Wi-Fi circuitry of an access control device with a wireless access point and communicating data to the access control device.
- Other embodiments are directed to apparatuses, systems, devices, hardware, methods, and combinations thereof for associating Wi-Fi circuitry of an access control device with a wireless access point and communicating data to the access control device.
- FIG. 1 is a simplified block diagram of at least one embodiment of an access control system
- FIG. 2 is a simplified block diagram of at least one embodiment of a computing system
- FIG. 3 is a simplified block diagram of at least one embodiment of an access control device of the system of FIG. 1 ;
- FIG. 4 is a simplified flow diagram of at least one embodiment of a method for communicating commands for an access control device from a mobile device to a server of the system of FIG. 1 ;
- FIGS. 5 and 6 are a simplified flow diagram of at least one embodiment of a method for associating Wi-Fi circuitry of an access control device with a wireless access point and communicating data to the access control device of the system of FIG. 1 .
- references in the specification to “one embodiment,” “an embodiment,” “an illustrative embodiment,” etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may or may not necessarily include that particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. It should further be appreciated that although reference to a “preferred” component or feature may indicate the desirability of a particular component or feature with respect to an embodiment, the disclosure is not so limiting with respect to other embodiments, which may omit such a component or feature.
- the disclosed embodiments may, in some cases, be implemented in hardware, firmware, software, or a combination thereof.
- the disclosed embodiments may also be implemented as instructions carried by or stored on one or more transitory or non-transitory machine-readable (e.g., computer-readable) storage media, which may be read and executed by one or more processors.
- a machine-readable storage medium may be embodied as any storage device, mechanism, or other physical structure for storing or transmitting information in a form readable by a machine (e.g., a volatile or non-volatile memory, a media disc, or other media device).
- an access control system 100 for associating Wi-Fi circuitry of an access control device with a wireless access point and communicating data to the access control device includes a mobile device 102 , a network 104 , a server 106 , an access control device 108 , and a wireless access point 110 .
- a mobile device 102 a mobile device 102 , a network 104 , a server 106 , an access control device 108 , and a wireless access point 110 .
- the access control system 100 may include multiple mobile devices 102 , networks 104 , servers 106 , access control devices 108 , and/or wireless access points 110 in other embodiments.
- one mobile device 102 may communicate access control data and/or command information for a particular access control device 108 , whereas another mobile device 102 may establish a Bluetooth Low Energy (BLE) communication connection with the access control device 108 , causing the access control device 108 to activate its Wi-Fi circuitry and establish a Wi-Fi communication connection with the server 106 as described herein.
- BLE Bluetooth Low Energy
- the functions described herein as being performed by the server 106 may be performed by a distributed network of servers 106 (e.g., cloud servers operating in a cloud computing environment 114 ).
- the system 100 and technologies described herein allow an access control device to be triggered by a Bluetooth central device to associate with a wireless access point and thereby perform Wi-Fi communications. Accordingly, the system 100 addresses deficiencies in the Wi-Fi station/access point architecture, allowing a station to be triggered to associate with an access point.
- the server 106 may function as a single source of information such that the access control device 108 communicates with the server 106 for data received from the mobile device 102 (e.g., via Wi-Fi) rather than communicating directly with the mobile device 102 (e.g., via Bluetooth). As such, the access control device 108 may retrieve relevant data from the server 106 even if the mobile device 102 is nearby the access control device 108 (e.g., with Bluetooth range).
- the mobile device 102 transmits access control data and/or command data to the server 106 that is intended to be transmitted to a particular access control device 108 .
- the server 106 stores that data in association with the particular access control device 108 .
- the mobile device 102 Upon subsequently interacting with a mobile device 102 (e.g., the same mobile device 102 that transmitted the access control data and/or command data or a different mobile device 102 ), the mobile device 102 establishes a BLE communication connection with the access control device 108 while a main microprocessor and Wi-Fi communication circuitry of the access control device 108 are in sleep states (e.g., low power states), which causes the Wi-Fi circuitry to wake from the sleep state to establish a Wi-Fi communication connection with the server 106 . Thereafter, the access control device 108 may receive any relevant access control data and/or command data from the server 106 . Further, in some embodiments, the access control device 108 may transmit audit data associated with the access control device 108 to the server 106 .
- sleep states e.g., low power states
- the mobile device 102 , the server 106 , the access control device 108 , and/or the wireless access point 110 may be embodied as any type of device or collection of devices suitable for performing the functions described herein. More specifically, in the illustrative embodiment, the mobile device 102 may be embodied as any type of device capable of communicating with the server 106 to transmit access control data and/or command data to the server 106 and/or capable of establishing a BLE communication connection with the access control device 108 .
- the mobile device 102 transmitting the data to the server 106 and the mobile device 102 establishing a BLE connection with the access control device 108 to trigger its Wi-Fi connection with the server 106 may be the same mobile device 102 or different mobile devices 102 depending on the particular embodiment. However, for brevity of the description and without loss of generality, it should be appreciated that the mobile devices 102 may be referred to herein as being the same.
- the mobile device 102 includes an application 112 that enables the mobile device 102 to communicate various access control data and/or commands to the server 106 for subsequent transmission to the access control device 108 .
- the application 112 may be embodied as any suitable application for performing the functions described herein.
- the application 112 may be embodied as a mobile application (e.g., smartphone application).
- the application 112 may serve as a client-side user interface for a web-based application or service of the server 106 .
- the network 104 may be embodied as any type of communication network capable of facilitating communication between the various devices of the system 100 .
- the network 104 may include one or more networks, routers, switches, computers, and/or other intervening devices.
- the network 104 may be embodied as or otherwise include one or more cellular networks, telephone networks, local or wide area networks, publicly available global networks (e.g., the Internet), ad hoc networks, short-range communication links, or a combination thereof.
- the server 106 may be embodied as any type of device(s) capable of performing the functions described herein.
- the server 106 may be configured to manage credentials of the access control system 100 .
- the server 106 may be responsible for ensuring that the access control devices 108 have updated authorized credentials, whitelists, blacklists, device parameters, and/or other suitable data.
- the server 106 may receive audit data (e.g., security data, raw sensor data, usage data, and/or other relevant audit data) from the access control devices 108 for management of the access control system 100 .
- the server 106 may be configured to communicate with multiple access control devices 108 at a single site (e.g., a particular building) and/or across multiple sites. That is, in such embodiments, the server 106 may be configured to receive data from access control devices 108 distributed across a single building, multiple buildings on a single campus, or across multiple locations.
- a single site e.g., a particular building
- the server 106 may be configured to receive data from access control devices 108 distributed across a single building, multiple buildings on a single campus, or across multiple locations.
- server 106 is described herein as a computing device outside of a cloud computing environment, in other embodiments, the server 106 may be embodied as a cloud-based device or collection of devices within a cloud computing environment 114 . Further, in cloud-based embodiments, the server 106 may be embodied as a “serverless” or server-ambiguous computing solution, for example, that executes a plurality of instructions on-demand, contains logic to execute instructions only when prompted by a particular activity/trigger, and does not consume computing resources when not in use.
- the server 106 may be embodied as a virtual computing environment residing “on” a computing system (e.g., a distributed network of devices) in which various virtual functions (e.g., Lamba functions, Azure functions, Google cloud functions, and/or other suitable virtual functions) may be executed corresponding with the functions of the server 106 described herein.
- a virtual computing environment residing “on” a computing system (e.g., a distributed network of devices) in which various virtual functions (e.g., Lamba functions, Azure functions, Google cloud functions, and/or other suitable virtual functions) may be executed corresponding with the functions of the server 106 described herein.
- an event e.g., data is transferred to the server 106 for handling
- the virtual computing environment may be communicated with (e.g., via a request to an API of the virtual computing environment), whereby the API may route the request to the correct virtual function (e.g., a particular server-ambiguous computing resource) based on a set of rules.
- the access control device 108 may be embodied as any type of device capable of controlling access through a passageway.
- the access control device 108 may be embodied as an electronic lock (e.g., a mortise lock, a cylindrical lock, or a tubular lock), an exit device (e.g., a pushbar or pushpad exit device), a door closer, an auto-operator, a motorized latch/bolt (e.g., for a sliding door), barrier control device (e.g., battery-powered), or a peripheral controller of a passageway.
- the access control device 108 may include a lock mechanism configured to control access through the passageway and/or other components typical of a lock device.
- the lock mechanism may include a deadbolt, latch bolt, level, and/or other mechanism adapted to move between a locked state and an unlocked state.
- the access control device 108 is configured to communicate with the server 106 to receive access control data and/or command data from the mobile device 102 (e.g., to lock or unlock a lock mechanism).
- the illustrative access control device 108 includes, among other components, a BLE circuitry 302 , a main microprocessor 304 , and a Wi-Fi circuitry 306 .
- the BLE circuitry 302 , the main microprocessor 304 , and the Wi-Fi circuitry 306 may be composed/decomposed in any other physical configuration/combination consistent with the techniques described herein.
- the wireless access point 110 may be embodied as any one or more devices that, individually or collectively, allow Wi-Fi devices to connect to a wired network and/or the Internet.
- the wireless access point 110 may be embodied as a gateway device that is communicatively coupled to a router.
- the wireless access point 110 may form an integral component of or otherwise form a portion of the router itself.
- the wireless access point 110 is described herein as being communicatively coupled to the Internet.
- each of the mobile device 102 , the server 106 , the access control device 108 , and/or the wireless access point 110 may be embodied as one or more computing devices similar to the computing device 200 described below in reference to FIG. 2 .
- each of the mobile device 102 , the server 106 , the access control device 108 , and the wireless access point 110 includes a processing device 202 and a memory 206 having stored thereon operating logic 208 (e.g., a plurality of instructions) for execution by the processing device 202 for operation of the corresponding device.
- FIG. 2 a simplified block diagram of at least one embodiment of a computing device 200 is shown.
- the illustrative computing device 200 depicts at least one embodiment of a mobile device, server, access control device, and/or wireless access point that may be utilized in connection with the mobile device 102 , the server 106 , the access control device 108 , and/or the wireless access point 110 illustrated in FIG. 1 .
- the computing device 200 may be embodied as a mobile computing device, server, access control device, desktop computer, laptop computer, tablet computer, notebook, netbook, UltrabookTM, cellular phone, smartphone, wearable computing device, personal digital assistant, Internet of Things (IoT) device, control panel, processing system, wireless access point, router, gateway, and/or any other computing, processing, and/or communication device capable of performing the functions described herein.
- IoT Internet of Things
- the computing device 200 includes a processing device 202 that executes algorithms and/or processes data in accordance with operating logic 208 , an input/output device 204 that enables communication between the computing device 200 and one or more external devices 210 , and memory 206 which stores, for example, data received from the external device 210 via the input/output device 204 .
- the input/output device 204 allows the computing device 200 to communicate with the external device 210 .
- the input/output device 204 may include a transceiver, a network adapter, a network card, an interface, one or more communication ports (e.g., a USB port, serial port, parallel port, an analog port, a digital port, VGA, DVI, HDMI, FireWire, CAT 5, or any other type of communication port or interface), and/or other communication circuitry.
- Communication circuitry of the computing device 200 may be configured to use any one or more communication technologies (e.g., wireless or wired communications) and associated protocols (e.g., Ethernet, Bluetooth®, Wi-Fi®, WiMAX, etc.) to effect such communication depending on the particular computing device 200 .
- the input/output device 204 may include hardware, software, and/or firmware suitable for performing the techniques described herein.
- the external device 210 may be any type of device that allows data to be inputted or outputted from the computing device 200 .
- the external device 210 may be embodied as the mobile device 102 , the server 106 , the access control device 108 , and/or the wireless access point 110 .
- the external device 210 may be embodied as another computing device, switch, diagnostic tool, controller, printer, display, alarm, peripheral device (e.g., keyboard, mouse, touch screen display, etc.), and/or any other computing, processing, and/or communication device capable of performing the functions described herein.
- the external device 210 may be integrated into the computing device 200 .
- the processing device 202 may be embodied as any type of processor(s) capable of performing the functions described herein.
- the processing device 202 may be embodied as one or more single or multi-core processors, microcontrollers, or other processor or processing/controlling circuits.
- the processing device 202 may include or be embodied as an arithmetic logic unit (ALU), central processing unit (CPU), digital signal processor (DSP), and/or another suitable processor(s).
- ALU arithmetic logic unit
- CPU central processing unit
- DSP digital signal processor
- the processing device 202 may be a programmable type, a dedicated hardwired state machine, or a combination thereof. Processing devices 202 with multiple processing units may utilize distributed, pipelined, and/or parallel processing in various embodiments.
- processing device 202 may be dedicated to performance of just the operations described herein, or may be utilized in one or more additional applications.
- the processing device 202 is programmable and executes algorithms and/or processes data in accordance with operating logic 208 as defined by programming instructions (such as software or firmware) stored in memory 206 .
- the operating logic 208 for processing device 202 may be at least partially defined by hardwired logic or other hardware.
- the processing device 202 may include one or more components of any type suitable to process the signals received from input/output device 204 or from other components or devices and to provide desired output signals. Such components may include digital circuitry, analog circuitry, or a combination thereof.
- the memory 206 may be of one or more types of non-transitory computer-readable media, such as a solid-state memory, electromagnetic memory, optical memory, or a combination thereof. Furthermore, the memory 206 may be volatile and/or nonvolatile and, in some embodiments, some or all of the memory 206 may be of a portable type, such as a disk, tape, memory stick, cartridge, and/or other suitable portable memory. In operation, the memory 206 may store various data and software used during operation of the computing device 200 such as operating systems, applications, programs, libraries, and drivers.
- the memory 206 may store data that is manipulated by the operating logic 208 of processing device 202 , such as, for example, data representative of signals received from and/or sent to the input/output device 204 in addition to or in lieu of storing programming instructions defining operating logic 208 .
- the memory 206 may be included with the processing device 202 and/or coupled to the processing device 202 depending on the particular embodiment.
- the processing device 202 , the memory 206 , and/or other components of the computing device 200 may form a portion of a system-on-a-chip (SoC) and be incorporated on a single integrated circuit chip.
- SoC system-on-a-chip
- various components of the computing device 200 may be communicatively coupled via an input/output subsystem, which may be embodied as circuitry and/or components to facilitate input/output operations with the processing device 202 , the memory 206 , and other components of the computing device 200 .
- the input/output subsystem may be embodied as, or otherwise include, memory controller hubs, input/output control hubs, firmware devices, communication links (i.e., point-to-point links, bus links, wires, cables, light guides, printed circuit board traces, etc.) and/or other components and subsystems to facilitate the input/output operations.
- the computing device 200 may include other or additional components, such as those commonly found in a typical computing device (e.g., various input/output devices and/or other components), in other embodiments. It should be further appreciated that one or more of the components of the computing device 200 described herein may be distributed across multiple computing devices. In other words, the techniques described herein may be employed by a computing system that includes one or more computing devices. Additionally, although only a single processing device 202 , I/O device 204 , and memory 206 are illustratively shown in FIG. 2 , it should be appreciated that a particular computing device 200 may include multiple processing devices 202 , I/O devices 204 , and/or memories 206 in other embodiments. Further, in some embodiments, more than one external device 210 may be in communication with the computing device 200 .
- Bluetooth includes traditional Bluetooth Basic Rate/Enhanced Rate (BR/EDR) technology and Bluetooth Low Energy (BLE) technology and refers to one or more components, architectures, communication protocols, and/or other systems, structures, or processes defined by and/or compliant with one or more Bluetooth specifications, addendums, and/or supplements overseen by the Bluetooth Special Interest Group (SIG) including, for example, active, legacy, withdrawn, deprecated, and/or subsequently introduced Bluetooth Core Specifications (CSs) (Bluetooth CS Version 1.0B, Bluetooth CS Version 1.1, Bluetooth CS Version 1.2, Bluetooth CS Version 2.0+EDR, Bluetooth CS Version 2.1+EDR, Bluetooth CS Version 3.0+HS, Bluetooth CS Version 4.0, Bluetooth CS Version 4.1, Bluetooth CS Version 4.2, Bluetooth CS Version 5.0); active, legacy, withdrawn, deprecated, and/or subsequently introduced Bluetooth Core Specification Addendums (CSAs) (Bluetooth CSA Version 1, Bluetooth CSA Version 2, Bluetooth CSA Version 3, Bluetooth
- the access control device 108 may include, more specifically, a BLE circuitry 302 , a main microprocessor 304 , and a Wi-Fi circuitry 306 as shown in FIG. 3 .
- the BLE circuitry 302 may be embodied as or include any type of circuitry or collection of circuitries (e.g., chipsets) suitable for performing Bluetooth communication (e.g., BLE communication) with other devices in the system 100 (e.g., mobile devices 102 ) and otherwise performing the functions described herein.
- BLE Bluetooth Basic Rate/Enhanced Rate
- the circuitry 302 may be embodied as traditional Bluetooth Basic Rate/Enhanced Rate (BR/EDR) communication circuitry in other embodiments.
- BLE circuitry 302 may be compliant with any one or more of the Bluetooth specifications set forth herein or newer.
- the main microprocessor 304 may be embodied as or include any type of device or collection of devices capable of processing data and otherwise performing the functions described herein.
- the main microprocessor 304 may be embodied as a processing device similar to the processing device 202 of FIG. 2 .
- the main microprocessor 304 may be configured to operate in multiple power states.
- the main microprocessor 304 is configured to operate in a normal power state and a low power sleep state that consumes less power than the normal power state.
- the main microprocessor 304 may be configured to operate in more than two power states (e.g., having multiple low power states).
- the Wi-Fi circuitry 306 may be embodied as or include any type of circuitry or collection of circuitries (e.g., chipsets) suitable for performing Wi-Fi-based communication with other devices in the system 100 (e.g., the wireless access point 110 ). As described herein, it should be appreciated that the Wi-Fi circuitry 306 may be configured to operate in multiple power states. For example, in the illustrative embodiment, the Wi-Fi circuitry 306 is configured to operate in a normal power state and a low power sleep state that consumes less power than the normal power state. In other embodiments, it should be appreciated that the Wi-Fi circuitry 306 may be configured to operate in more than two power states (e.g., having multiple low power states).
- the normal and low power sleep states of the main microprocessor 304 and the Wi-Fi circuitry 306 may be different power states, for example, having different levels of power consumption.
- the BLE circuitry 302 , the main microprocessor 304 , and the Wi-Fi circuitry 306 may be composed/decomposed in another suitable physical configuration/combination in other embodiments.
- the system 100 may execute a method 400 for communicating commands for the access control device 108 from the mobile device 102 to the server 106 .
- the illustrative method 400 begins with block 402 in which the mobile device 102 determines one or more commands and/or other access control data to be issued/sent to the access control device 108 . It should be appreciated that the particular commands and/or access control data may vary depending on the particular embodiment.
- the commands may include a command to unlock a lock mechanism of the access control device 108 , lock a lock mechanism of the access control device 108 , retrieve a firmware update for the access control device 108 , retrieve updated access control permissions, retrieve updated access control schedules, and/or other suitable commands/data.
- the mobile device 102 may determine or identify relevant credential data associated with a user of the mobile device 102 and/or the mobile device 102 itself.
- the mobile device 102 establishes a wireless communication connection with the server 106 for transmission of the command(s) and/or access control data.
- the wireless communication connection may be established according to any suitable communication protocol and/or using any suitable networks (e.g., cellular communication, Internet-based communication, etc.).
- the mobile device 102 transmits the determined command(s) and/or access control data to the server 106 .
- the server 106 may authenticate the mobile device 102 and/or its user. Accordingly, the mobile device 102 may transmit any relevant credential data, PIN data, and/or other authentication data, and the mobile device 102 and server 106 may execute a suitable authentication algorithm.
- one or more other wired and/or wireless techniques may be used to transmit commands to the server 106 (e.g., via web application, Postman, or another suitable technology or protocol).
- the server 106 stores the received command(s) and/or access control data in association with the access control device 108 .
- the server 106 may utilize a database that stores the received command(s) and/or access control data and associates the stored data with the relevant access control device 108 such that it can be subsequently retrieved by the access control device 108 as described herein.
- the system 100 may execute a method 500 for associating the Wi-Fi circuitry 306 of the access control device 108 with the wireless access point 110 and communicating access control data to the access control device 108 .
- the particular blocks of the method 500 are illustrated by way of example, and such blocks may be combined or divided, added or removed, and/or reordered in whole or in part depending on the particular embodiment, unless stated to the contrary.
- the method 500 is commenced when the main microprocessor 304 and the Wi-Fi circuitry 306 of the access control device 108 are in corresponding low power sleep states.
- the illustrative method 500 begins with block 502 of FIG. 5 in which the access control device 108 establishes a BLE connection with a mobile device 102 (e.g., the mobile device 102 described in reference to the method 400 of FIG. 4 or a different mobile device 102 ).
- a mobile device 102 may come within BLE communication range of the access control device 108 and establish a “low-level” BLE connection with the access control device 108 (e.g., in response to a BLE advertisement).
- the “low-level” BLE connection (e.g., via a “BLE Connect” function) may be an initial connection between the mobile device 102 and the access control device 108 such that the mobile device 102 can be an unpaired device (e.g., before any credential information is transmitted from the mobile device 102 to the access control device 108 ).
- the mobile device 102 that establishes the BLE connection with the access control device 108 may or may not be the same as, or related to, the mobile device 102 that transmitted the command(s) and/or access control data to the server 106 as described in reference to the method 400 of FIG. 4 .
- the access control device 108 wakes its Wi-Fi circuitry 306 in response to the BLE connection.
- the BLE circuitry 302 of the access control device 108 causes (e.g., generates or sends) an interrupt to the main microprocessor 304 that wakes the main microprocessor 304 from the low power sleep state in the illustrative embodiment.
- the main microprocessor 304 transitions from the low power sleep state to the normal power state in response to the interrupt.
- the illustrative main microprocessor 304 determines that the BLE circuitry 302 has established a connection with another device (e.g., the mobile device 102 ) and, in block 510 , the main microprocessor 304 wakes the Wi-Fi circuitry 306 from the lower power sleep state.
- the main microprocessor 304 may execute a “start function” that triggers the Wi-Fi circuitry 306 to transition from the low power sleep state to the normal power state.
- the access control device 108 may otherwise wake its Wi-Fi circuitry 306 in response to the BLE connection.
- the access control device 108 establishes a Wi-Fi communication connection with the server 106 using the Wi-Fi circuitry 306 . More specifically, the access control device 108 may establish a Wi-Fi communication connection/link with the wireless access point 110 , which is communicatively coupled to the server 106 (e.g., over the Internet).
- the access control device 108 requests any pending commands and/or other access control data from the server 106 via the Wi-Fi communication connection.
- the server 106 determines whether it has stored thereon, or otherwise has access to, commands and/or other access control data associated with the requesting access control device 108 .
- the server 106 may store such data in a database in association with the corresponding access control device 108 for simplified searching.
- the method 500 advances to block 518 in which the server 106 transmits a commands message to the access control device 108 via the Wi-Fi communication connection (e.g., via the connection between the server 106 and the wireless access point 110 and further via the Wi-Fi connection between the wireless access point 110 and the access control device 108 ).
- the commands message may include the command(s) and/or access control data retrieved by the server 106 (e.g., received by the mobile device 102 by virtue of the method 400 of FIG. 4 ).
- the commands message may, additionally or alternatively, provide access instructions and/or directions for retrieving the relevant data from a particular source.
- the command(s) may include, for example, a command to unlock a lock mechanism of the access control device 108 , lock a lock mechanism of the access control device 108 , retrieve a firmware update for the access control device 108 , retrieve updated access control permissions, retrieve updated access control schedules, and/or other suitable commands/data.
- the access control device 108 may execute one or more commands associated with the commands message by performing the commanded function(s). The method 500 advances to block 522 .
- the method 500 advances to block 522 in which the access control device 108 is synchronized with the server 106 via the Wi-Fi communication connection (e.g., via the Wi-Fi connection between access control device 108 and the wireless access point 110 and further via the connection between the wireless access point 110 and the server 106 ).
- the access control device 108 may determine whether it has audit data (e.g., security data, raw sensor data, usage data, and/or other relevant audit data) and/or other relevant data to transmit to the server 106 .
- audit data e.g., security data, raw sensor data, usage data, and/or other relevant audit data
- the access control device 108 may transmit state data indicative of a current state of the access control device 108 (e.g., the current operational state of a lock mechanism and/or other component(s) of the access control device 108 ).
- state data indicative of a current state of the access control device 108 e.g., the current operational state of a lock mechanism and/or other component(s) of the access control device 108.
- the access control device 108 places the Wi-Fi circuitry 306 in the low power sleep state. Further, in some embodiments, the access control device 108 may also transition the main microprocessor 304 from the normal power state to the low power sleep state (e.g., subsequent to processing any relevant data associated with the method 500 ).
- the access control device 108 may be triggered to wake up the Wi-Fi circuitry 306 and/or the main microprocessor 304 according to another mechanism.
- the access control device 108 may include a physical button, handle, or actuator that may be contacted by the user to wake up the access control device 108 components.
- the access control device 108 may include a timer that will wake up with Wi-Fi circuitry 306 and/or the main microprocessor 304 after a predetermined period of time has lapsed. It should be appreciated that the access control device 108 may utilize multiple triggers in some embodiments.
- a method includes establishing, by Bluetooth Low Energy (BLE) circuitry of an access control device, a BLE communication connection with a first mobile device while a main microprocessor and a Wi-Fi circuitry of the access control device are in sleep states, waking, by the access control device, the Wi-Fi circuitry of the access control device from the sleep state in response to establishing the BLE communication connection with the mobile device, establishing, by the Wi-Fi circuitry of the access control device, a Wi-Fi communication connection with an access control server in response to waking the Wi-Fi circuitry from the sleep state, and receiving, by the access control device and from the access control server via the Wi-Fi communication connection, access control data for the access control device transmitted from a second mobile device to the access control server.
- BLE Bluetooth Low Energy
- waking the Wi-Fi circuitry of the access control device from the sleep state may include generating, by the BLE circuitry, an interrupt to the main microprocessor that wakes the main microprocessor from the sleep state in response to establishing the BLE connection with the first mobile device and waking, by the main microprocessor, the Wi-Fi circuitry in response to the interrupt.
- establishing the Wi-Fi communication connection with the access control server may include establishing a Wi-Fi communication with a wireless access point that is communicatively coupled with the access control server over the Internet.
- receiving the access control data may include transmitting, by the access control device and to the access control server, a request for pending access control commands associated with the access control device and receiving, by the access control device and from the access control server, at least one pending access control command stored in association with the access control device.
- the at least one pending access control command may include a command to one of lock a lock mechanism of the access control device or unlock the lock mechanism of the access control device.
- the method may further include executing, by the access control device, the at least one pending access control command.
- the method may further include transmitting, by the access control device and to the access control server via the Wi-Fi communication connection, audit data associated with the access control device.
- the method may further include placing the Wi-Fi circuitry in the sleep state in response to receiving the access control data from the access control server.
- the method may further include transmitting, by the second mobile device, the access control data to the access control server via a wireless communication connection between the second mobile device and the access control server and storing, by the access control server, the access control data in association with the access control device.
- the first mobile device may be different from the second mobile device.
- the server may be executed in a cloud computing environment.
- an access control device includes a main microprocessor configured to operate in at least a first normal power state and a first sleep state, a Wi-Fi circuitry configured to operate in at least a second normal power state and a second sleep state, and a Bluetooth Low Energy (BLE) circuitry configured to establish a BLE communication connection with a first mobile device while the main microprocessor is in the first sleep state and the Wi-Fi circuitry is in the second sleep state and generate an interrupt to the main microprocessor that transitions the main microprocessor from the first sleep state to the first normal power state, wherein the main microprocessor is configured to transition the Wi-Fi circuitry from the second sleep state to the second normal power state in response to the interrupt, and the Wi-Fi circuitry is configured to establish a Wi-Fi communication connection with an access control server in response to transitioning to the second normal power state and receive access control data from the access control device transmitted from a second mobile device to the access control server.
- BLE Bluetooth Low Energy
- to establish the Wi-Fi communication connection with the access control server may include to establish a Wi-Fi communication with a wireless access point that is communicatively coupled with the access control server over the Internet.
- to receive the access control data may include to transmit a request for pending access control commands associated with the access control device to the access control server and receive at least one pending access control command stored in association with the access control device from the access control server.
- the access control device may further include an electronic lock mechanism adapted to move between a locked position and an unlocked position, and the at least one pending access control command may include a command to one of move the electronic lock mechanism to the locked position or move the electronic lock mechanism to the unlocked position.
- the main microprocessor may be configured to execute the at least one pending access control command.
- the Wi-Fi circuitry may return to the sleep state in response to receipt of the access control data from the access control server.
- an access control system includes an access control server and an access control device having a main microprocessor configured to operate in at least a first normal power state and a first sleep state, a Wi-Fi circuitry configured to operate in at least a second normal power state and a second sleep state, and a Bluetooth Low Energy (BLE) circuitry configured to establish a BLE communication connection with a first mobile device while the main microprocessor is in the first sleep state and the Wi-Fi circuitry is in the second sleep state and generate an interrupt to the main microprocessor that wakes the main microprocessor from the first sleep state to the first normal power state, wherein the main microprocessor is configured to wake the Wi-Fi circuitry from the second sleep state to the second normal power state in response to the interrupt and the Wi-Fi circuitry is configured to establish a Wi-Fi communication connection with the access control server in response to entering the second normal power state and receive access control data from the access control device transmitted from a second mobile device to the access control server.
- BLE Bluetooth Low Energy
- the access control system may further include the second mobile device, wherein the second mobile device may be configured to transmit the access control data to the access control server via a wireless communication connection between the second mobile device and the access control server, and the access control server may be configured to store the access control data in association with the access control device.
- the first mobile device may be different from the second mobile device.
Abstract
Description
- The IEEE 802.11 standard outlines specific protocols for implementing Wi-Fi-based wireless local area network (WLAN) communications. The Bluetooth Special Interest Group (SIG) develops and outlines the standards for implementing Bluetooth communication. According to the 802.11 standard, a wireless network station device initiates the connection to a wireless access point, which is in contrast to a Bluetooth network, in which the central device initiates the connection to a peripheral device. As such, if a wireless network station device needs to communicate via the Internet, it must already be associated with a wireless access point. Power-sensitive Wi-Fi devices generally disassociate from provisioned access points when there is no data to transfer over a network and, therefore, some trigger is generally needed to cause the device to re-associate with the access point. For example, a user typically must physically interact with a station (e.g., via a mechanical button) to initiate the station to connection to a wireless access point.
- One embodiment is directed to a unique system, components, and methods for associating Wi-Fi circuitry of an access control device with a wireless access point and communicating data to the access control device. Other embodiments are directed to apparatuses, systems, devices, hardware, methods, and combinations thereof for associating Wi-Fi circuitry of an access control device with a wireless access point and communicating data to the access control device. This summary is not intended to identify key or essential features of the claimed subject matter, nor is it intended to be used as an aid in limiting the scope of the claimed subject matter. Further embodiments, forms, features, and aspects of the present application shall become apparent from the description and figures provided herewith.
- The concepts described herein are illustrative by way of example and not by way of limitation in the accompanying figures. For simplicity and clarity of illustration, elements illustrated in the figures are not necessarily drawn to scale. Where considered appropriate, references labels have been repeated among the figures to indicate corresponding or analogous elements.
-
FIG. 1 is a simplified block diagram of at least one embodiment of an access control system; -
FIG. 2 is a simplified block diagram of at least one embodiment of a computing system; -
FIG. 3 is a simplified block diagram of at least one embodiment of an access control device of the system ofFIG. 1 ; -
FIG. 4 is a simplified flow diagram of at least one embodiment of a method for communicating commands for an access control device from a mobile device to a server of the system ofFIG. 1 ; and -
FIGS. 5 and 6 are a simplified flow diagram of at least one embodiment of a method for associating Wi-Fi circuitry of an access control device with a wireless access point and communicating data to the access control device of the system ofFIG. 1 . - Although the concepts of the present disclosure are susceptible to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and will be described herein in detail. It should be understood, however, that there is no intent to limit the concepts of the present disclosure to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives consistent with the present disclosure and the appended claims.
- References in the specification to “one embodiment,” “an embodiment,” “an illustrative embodiment,” etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may or may not necessarily include that particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. It should further be appreciated that although reference to a “preferred” component or feature may indicate the desirability of a particular component or feature with respect to an embodiment, the disclosure is not so limiting with respect to other embodiments, which may omit such a component or feature. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to implement such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described. Additionally, it should be appreciated that items included in a list in the form of “at least one of A, B, and C” can mean (A); (B); (C); (A and B); (B and C); (A and C); or (A, B, and C). Similarly, items listed in the form of “at least one of A, B, or C” can mean (A); (B); (C); (A and B); (B and C); (A and C); or (A, B, and C). Further, with respect to the claims, the use of words and phrases such as “a,” “an,” “at least one,” and/or “at least one portion” should not be interpreted so as to be limiting to only one such element unless specifically stated to the contrary, and the use of phrases such as “at least a portion” and/or “a portion” should be interpreted as encompassing both embodiments including only a portion of such element and embodiments including the entirety of such element unless specifically stated to the contrary.
- The disclosed embodiments may, in some cases, be implemented in hardware, firmware, software, or a combination thereof. The disclosed embodiments may also be implemented as instructions carried by or stored on one or more transitory or non-transitory machine-readable (e.g., computer-readable) storage media, which may be read and executed by one or more processors. A machine-readable storage medium may be embodied as any storage device, mechanism, or other physical structure for storing or transmitting information in a form readable by a machine (e.g., a volatile or non-volatile memory, a media disc, or other media device).
- In the drawings, some structural or method features may be shown in specific arrangements and/or orderings. However, it should be appreciated that such specific arrangements and/or orderings may not be required. Rather, in some embodiments, such features may be arranged in a different manner and/or order than shown in the illustrative figures unless indicated to the contrary. Additionally, the inclusion of a structural or method feature in a particular figure is not meant to imply that such feature is required in all embodiments and, in some embodiments, may not be included or may be combined with other features.
- Referring now to
FIG. 1 , in the illustrative embodiment, anaccess control system 100 for associating Wi-Fi circuitry of an access control device with a wireless access point and communicating data to the access control device includes amobile device 102, anetwork 104, aserver 106, anaccess control device 108, and awireless access point 110. Although only onemobile device 102, onenetwork 104, oneserver 106, oneaccess control device 108, and onewireless access point 110 are shown in the illustrative embodiment ofFIG. 1 , theaccess control system 100 may include multiplemobile devices 102,networks 104,servers 106,access control devices 108, and/orwireless access points 110 in other embodiments. For example, in some embodiments, onemobile device 102 may communicate access control data and/or command information for a particularaccess control device 108, whereas anothermobile device 102 may establish a Bluetooth Low Energy (BLE) communication connection with theaccess control device 108, causing theaccess control device 108 to activate its Wi-Fi circuitry and establish a Wi-Fi communication connection with theserver 106 as described herein. Further, in some embodiments, the functions described herein as being performed by theserver 106 may be performed by a distributed network of servers 106 (e.g., cloud servers operating in a cloud computing environment 114). - It should be appreciated that the
system 100 and technologies described herein allow an access control device to be triggered by a Bluetooth central device to associate with a wireless access point and thereby perform Wi-Fi communications. Accordingly, thesystem 100 addresses deficiencies in the Wi-Fi station/access point architecture, allowing a station to be triggered to associate with an access point. It should be further appreciated that for synchronization and bandwidth considerations, for example, theserver 106 may function as a single source of information such that theaccess control device 108 communicates with theserver 106 for data received from the mobile device 102 (e.g., via Wi-Fi) rather than communicating directly with the mobile device 102 (e.g., via Bluetooth). As such, theaccess control device 108 may retrieve relevant data from theserver 106 even if themobile device 102 is nearby the access control device 108 (e.g., with Bluetooth range). - As described in greater detail below, the
mobile device 102 transmits access control data and/or command data to theserver 106 that is intended to be transmitted to a particularaccess control device 108. As such, theserver 106 stores that data in association with the particularaccess control device 108. Upon subsequently interacting with a mobile device 102 (e.g., the samemobile device 102 that transmitted the access control data and/or command data or a different mobile device 102), themobile device 102 establishes a BLE communication connection with theaccess control device 108 while a main microprocessor and Wi-Fi communication circuitry of theaccess control device 108 are in sleep states (e.g., low power states), which causes the Wi-Fi circuitry to wake from the sleep state to establish a Wi-Fi communication connection with theserver 106. Thereafter, theaccess control device 108 may receive any relevant access control data and/or command data from theserver 106. Further, in some embodiments, theaccess control device 108 may transmit audit data associated with theaccess control device 108 to theserver 106. - It should be appreciated that the
mobile device 102, theserver 106, theaccess control device 108, and/or thewireless access point 110 may be embodied as any type of device or collection of devices suitable for performing the functions described herein. More specifically, in the illustrative embodiment, themobile device 102 may be embodied as any type of device capable of communicating with theserver 106 to transmit access control data and/or command data to theserver 106 and/or capable of establishing a BLE communication connection with theaccess control device 108. As described above, it should be appreciated that themobile device 102 transmitting the data to theserver 106 and themobile device 102 establishing a BLE connection with theaccess control device 108 to trigger its Wi-Fi connection with theserver 106 may be the samemobile device 102 or differentmobile devices 102 depending on the particular embodiment. However, for brevity of the description and without loss of generality, it should be appreciated that themobile devices 102 may be referred to herein as being the same. - As shown in
FIG. 1 , themobile device 102 includes anapplication 112 that enables themobile device 102 to communicate various access control data and/or commands to theserver 106 for subsequent transmission to theaccess control device 108. It should be appreciated that theapplication 112 may be embodied as any suitable application for performing the functions described herein. For example, in some embodiments, theapplication 112 may be embodied as a mobile application (e.g., smartphone application). In some embodiments, it should be appreciated that theapplication 112 may serve as a client-side user interface for a web-based application or service of theserver 106. - The
network 104 may be embodied as any type of communication network capable of facilitating communication between the various devices of thesystem 100. As such, thenetwork 104 may include one or more networks, routers, switches, computers, and/or other intervening devices. For example, thenetwork 104 may be embodied as or otherwise include one or more cellular networks, telephone networks, local or wide area networks, publicly available global networks (e.g., the Internet), ad hoc networks, short-range communication links, or a combination thereof. - The
server 106 may be embodied as any type of device(s) capable of performing the functions described herein. In some embodiments, theserver 106 may be configured to manage credentials of theaccess control system 100. For example, depending on the particular embodiment, theserver 106 may be responsible for ensuring that theaccess control devices 108 have updated authorized credentials, whitelists, blacklists, device parameters, and/or other suitable data. Additionally, in some embodiments, theserver 106 may receive audit data (e.g., security data, raw sensor data, usage data, and/or other relevant audit data) from theaccess control devices 108 for management of theaccess control system 100. In some embodiments, it should be appreciated that theserver 106 may be configured to communicate with multipleaccess control devices 108 at a single site (e.g., a particular building) and/or across multiple sites. That is, in such embodiments, theserver 106 may be configured to receive data fromaccess control devices 108 distributed across a single building, multiple buildings on a single campus, or across multiple locations. - It should be further appreciated that, although the
server 106 is described herein as a computing device outside of a cloud computing environment, in other embodiments, theserver 106 may be embodied as a cloud-based device or collection of devices within acloud computing environment 114. Further, in cloud-based embodiments, theserver 106 may be embodied as a “serverless” or server-ambiguous computing solution, for example, that executes a plurality of instructions on-demand, contains logic to execute instructions only when prompted by a particular activity/trigger, and does not consume computing resources when not in use. That is, theserver 106 may be embodied as a virtual computing environment residing “on” a computing system (e.g., a distributed network of devices) in which various virtual functions (e.g., Lamba functions, Azure functions, Google cloud functions, and/or other suitable virtual functions) may be executed corresponding with the functions of theserver 106 described herein. For example, when an event occurs (e.g., data is transferred to theserver 106 for handling), the virtual computing environment may be communicated with (e.g., via a request to an API of the virtual computing environment), whereby the API may route the request to the correct virtual function (e.g., a particular server-ambiguous computing resource) based on a set of rules. As such, when a request for the transmission of access control data is made (e.g., via an appropriate user interface to the server 106), the appropriate virtual function(s) may be executed to perform the actions before eliminating the instance of the virtual function(s). - The
access control device 108 may be embodied as any type of device capable of controlling access through a passageway. For example, in various embodiments, theaccess control device 108 may be embodied as an electronic lock (e.g., a mortise lock, a cylindrical lock, or a tubular lock), an exit device (e.g., a pushbar or pushpad exit device), a door closer, an auto-operator, a motorized latch/bolt (e.g., for a sliding door), barrier control device (e.g., battery-powered), or a peripheral controller of a passageway. It should be further appreciated that theaccess control device 108 may include a lock mechanism configured to control access through the passageway and/or other components typical of a lock device. For example, the lock mechanism may include a deadbolt, latch bolt, level, and/or other mechanism adapted to move between a locked state and an unlocked state. In the illustrative embodiment, theaccess control device 108 is configured to communicate with theserver 106 to receive access control data and/or command data from the mobile device 102 (e.g., to lock or unlock a lock mechanism). Additionally, as described in reference toFIG. 3 , the illustrativeaccess control device 108 includes, among other components, aBLE circuitry 302, amain microprocessor 304, and a Wi-Fi circuitry 306. In other embodiments, however, rather than forming separate circuitries, it should be appreciated that theBLE circuitry 302, themain microprocessor 304, and the Wi-Fi circuitry 306 may be composed/decomposed in any other physical configuration/combination consistent with the techniques described herein. - The
wireless access point 110 may be embodied as any one or more devices that, individually or collectively, allow Wi-Fi devices to connect to a wired network and/or the Internet. For example, in some embodiments, thewireless access point 110 may be embodied as a gateway device that is communicatively coupled to a router. In other embodiments, thewireless access point 110 may form an integral component of or otherwise form a portion of the router itself. For simplicity and clarity of the description, thewireless access point 110 is described herein as being communicatively coupled to the Internet. - It should be appreciated that each of the
mobile device 102, theserver 106, theaccess control device 108, and/or thewireless access point 110 may be embodied as one or more computing devices similar to thecomputing device 200 described below in reference toFIG. 2 . For example, in the illustrative embodiment, each of themobile device 102, theserver 106, theaccess control device 108, and thewireless access point 110 includes aprocessing device 202 and amemory 206 having stored thereon operating logic 208 (e.g., a plurality of instructions) for execution by theprocessing device 202 for operation of the corresponding device. - Referring now to
FIG. 2 , a simplified block diagram of at least one embodiment of acomputing device 200 is shown. Theillustrative computing device 200 depicts at least one embodiment of a mobile device, server, access control device, and/or wireless access point that may be utilized in connection with themobile device 102, theserver 106, theaccess control device 108, and/or thewireless access point 110 illustrated inFIG. 1 . Depending on the particular embodiment, thecomputing device 200 may be embodied as a mobile computing device, server, access control device, desktop computer, laptop computer, tablet computer, notebook, netbook, Ultrabook™, cellular phone, smartphone, wearable computing device, personal digital assistant, Internet of Things (IoT) device, control panel, processing system, wireless access point, router, gateway, and/or any other computing, processing, and/or communication device capable of performing the functions described herein. - The
computing device 200 includes aprocessing device 202 that executes algorithms and/or processes data in accordance withoperating logic 208, an input/output device 204 that enables communication between thecomputing device 200 and one or moreexternal devices 210, andmemory 206 which stores, for example, data received from theexternal device 210 via the input/output device 204. - The input/
output device 204 allows thecomputing device 200 to communicate with theexternal device 210. For example, the input/output device 204 may include a transceiver, a network adapter, a network card, an interface, one or more communication ports (e.g., a USB port, serial port, parallel port, an analog port, a digital port, VGA, DVI, HDMI, FireWire, CAT 5, or any other type of communication port or interface), and/or other communication circuitry. Communication circuitry of thecomputing device 200 may be configured to use any one or more communication technologies (e.g., wireless or wired communications) and associated protocols (e.g., Ethernet, Bluetooth®, Wi-Fi®, WiMAX, etc.) to effect such communication depending on theparticular computing device 200. The input/output device 204 may include hardware, software, and/or firmware suitable for performing the techniques described herein. - The
external device 210 may be any type of device that allows data to be inputted or outputted from thecomputing device 200. For example, in various embodiments, theexternal device 210 may be embodied as themobile device 102, theserver 106, theaccess control device 108, and/or thewireless access point 110. Further, in some embodiments, theexternal device 210 may be embodied as another computing device, switch, diagnostic tool, controller, printer, display, alarm, peripheral device (e.g., keyboard, mouse, touch screen display, etc.), and/or any other computing, processing, and/or communication device capable of performing the functions described herein. Furthermore, in some embodiments, it should be appreciated that theexternal device 210 may be integrated into thecomputing device 200. - The
processing device 202 may be embodied as any type of processor(s) capable of performing the functions described herein. In particular, theprocessing device 202 may be embodied as one or more single or multi-core processors, microcontrollers, or other processor or processing/controlling circuits. For example, in some embodiments, theprocessing device 202 may include or be embodied as an arithmetic logic unit (ALU), central processing unit (CPU), digital signal processor (DSP), and/or another suitable processor(s). Theprocessing device 202 may be a programmable type, a dedicated hardwired state machine, or a combination thereof.Processing devices 202 with multiple processing units may utilize distributed, pipelined, and/or parallel processing in various embodiments. Further, theprocessing device 202 may be dedicated to performance of just the operations described herein, or may be utilized in one or more additional applications. In the illustrative embodiment, theprocessing device 202 is programmable and executes algorithms and/or processes data in accordance withoperating logic 208 as defined by programming instructions (such as software or firmware) stored inmemory 206. Additionally or alternatively, the operatinglogic 208 forprocessing device 202 may be at least partially defined by hardwired logic or other hardware. Further, theprocessing device 202 may include one or more components of any type suitable to process the signals received from input/output device 204 or from other components or devices and to provide desired output signals. Such components may include digital circuitry, analog circuitry, or a combination thereof. - The
memory 206 may be of one or more types of non-transitory computer-readable media, such as a solid-state memory, electromagnetic memory, optical memory, or a combination thereof. Furthermore, thememory 206 may be volatile and/or nonvolatile and, in some embodiments, some or all of thememory 206 may be of a portable type, such as a disk, tape, memory stick, cartridge, and/or other suitable portable memory. In operation, thememory 206 may store various data and software used during operation of thecomputing device 200 such as operating systems, applications, programs, libraries, and drivers. It should be appreciated that thememory 206 may store data that is manipulated by the operatinglogic 208 ofprocessing device 202, such as, for example, data representative of signals received from and/or sent to the input/output device 204 in addition to or in lieu of storing programming instructions definingoperating logic 208. As shown inFIG. 2 , thememory 206 may be included with theprocessing device 202 and/or coupled to theprocessing device 202 depending on the particular embodiment. For example, in some embodiments, theprocessing device 202, thememory 206, and/or other components of thecomputing device 200 may form a portion of a system-on-a-chip (SoC) and be incorporated on a single integrated circuit chip. - In some embodiments, various components of the computing device 200 (e.g., the
processing device 202 and the memory 206) may be communicatively coupled via an input/output subsystem, which may be embodied as circuitry and/or components to facilitate input/output operations with theprocessing device 202, thememory 206, and other components of thecomputing device 200. For example, the input/output subsystem may be embodied as, or otherwise include, memory controller hubs, input/output control hubs, firmware devices, communication links (i.e., point-to-point links, bus links, wires, cables, light guides, printed circuit board traces, etc.) and/or other components and subsystems to facilitate the input/output operations. - The
computing device 200 may include other or additional components, such as those commonly found in a typical computing device (e.g., various input/output devices and/or other components), in other embodiments. It should be further appreciated that one or more of the components of thecomputing device 200 described herein may be distributed across multiple computing devices. In other words, the techniques described herein may be employed by a computing system that includes one or more computing devices. Additionally, although only asingle processing device 202, I/O device 204, andmemory 206 are illustratively shown in FIG. 2, it should be appreciated that aparticular computing device 200 may includemultiple processing devices 202, I/O devices 204, and/ormemories 206 in other embodiments. Further, in some embodiments, more than oneexternal device 210 may be in communication with thecomputing device 200. - As used herein, “Bluetooth” includes traditional Bluetooth Basic Rate/Enhanced Rate (BR/EDR) technology and Bluetooth Low Energy (BLE) technology and refers to one or more components, architectures, communication protocols, and/or other systems, structures, or processes defined by and/or compliant with one or more Bluetooth specifications, addendums, and/or supplements overseen by the Bluetooth Special Interest Group (SIG) including, for example, active, legacy, withdrawn, deprecated, and/or subsequently introduced Bluetooth Core Specifications (CSs) (Bluetooth CS Version 1.0B, Bluetooth CS Version 1.1, Bluetooth CS Version 1.2, Bluetooth CS Version 2.0+EDR, Bluetooth CS Version 2.1+EDR, Bluetooth CS Version 3.0+HS, Bluetooth CS Version 4.0, Bluetooth CS Version 4.1, Bluetooth CS Version 4.2, Bluetooth CS Version 5.0); active, legacy, withdrawn, deprecated, and/or subsequently introduced Bluetooth Core Specification Addendums (CSAs) (Bluetooth CSA Version 1, Bluetooth CSA Version 2, Bluetooth CSA Version 3, Bluetooth CSA Version 4, Bluetooth CSA Version 5, Bluetooth CSA Version 6); Bluetooth Core Specification Supplements (CSSs) (Bluetooth CSS Version 1, Bluetooth CSS Version 2, Bluetooth CSS Version 3, Bluetooth CSS Version 4, Bluetooth CSS Version 5, Bluetooth CSS Version 6, Bluetooth CSS Version 7); active, legacy, withdrawn, deprecated, and/or subsequently introduced Bluetooth Mesh Networking Specifications (Bluetooth Mesh Profile Specification 1.0, Bluetooth Mesh Model Specification 1.0, Bluetooth Mesh Device Properties 1.0); active, legacy, withdrawn, deprecated, and/or subsequently introduced Bluetooth Traditional Profile Specifications (3DSP, A2DP, AVRCP, BIP, BPP, CTN, DI, DUN, FTP, GAVDP, GNSS, GOEP, GPP, HCRP, HDP, HFP, HID, HSP, MAP, MPS, OPP, PAN, PBAP, SAP, SPP, SYNCH, VDP); active, legacy, withdrawn, deprecated, and/or subsequently introduced Bluetooth Protocol Specifications (AVCTP, AVDTP, BNEP, IrDA, MCAP, RFCOMM, 3WIRE, SD, TCP, UART, USB, WAPB); active, legacy, withdrawn, deprecated, and/or subsequently introduced Bluetooth Generic Attribute Profile (GATT) services, characteristics, declarations, descriptors, and profiles (ANP, ANS, AIOP, AIOS, BAS, BCS, BLP, BLS, BMS, CGMP, CGMS, CPP, CPS, CSCP, CSCS, CTS, DIS, ESP, ESS, FMP, FTMP, FTMS, GSS, GLP, GLS, HIDS, HOGP, HPS, HRP, HRS, HTP, HTS, IAS, IDP, IDS, IPS, IPSP, LLS, LNP, LNS, NDCS, OTP, OTS, PASP, PASS, PXP, PLXP, PLXS, RCP, RCS, RSCP, RSCS, TRUS, ScPP, ScPS, TDS, TIP, TPS, UDS, WSP, WSS); and/or other Bluetooth specifications, addendums, and/or supplements.
- It should be further appreciated that the
access control device 108 may include, more specifically, aBLE circuitry 302, amain microprocessor 304, and a Wi-Fi circuitry 306 as shown inFIG. 3 . - The
BLE circuitry 302 may be embodied as or include any type of circuitry or collection of circuitries (e.g., chipsets) suitable for performing Bluetooth communication (e.g., BLE communication) with other devices in the system 100 (e.g., mobile devices 102) and otherwise performing the functions described herein. Although described herein as being “BLE” circuitry in the illustrative embodiment, it should be appreciated that thecircuitry 302 may be embodied as traditional Bluetooth Basic Rate/Enhanced Rate (BR/EDR) communication circuitry in other embodiments. Further, depending on the particular embodiment, theBLE circuitry 302 may be compliant with any one or more of the Bluetooth specifications set forth herein or newer. - The
main microprocessor 304 may be embodied as or include any type of device or collection of devices capable of processing data and otherwise performing the functions described herein. For example, in some embodiments, themain microprocessor 304 may be embodied as a processing device similar to theprocessing device 202 ofFIG. 2 . Further, it should be appreciated that themain microprocessor 304 may be configured to operate in multiple power states. For example, in the illustrative embodiment, themain microprocessor 304 is configured to operate in a normal power state and a low power sleep state that consumes less power than the normal power state. In other embodiments, it should be appreciated that themain microprocessor 304 may be configured to operate in more than two power states (e.g., having multiple low power states). - The Wi-
Fi circuitry 306 may be embodied as or include any type of circuitry or collection of circuitries (e.g., chipsets) suitable for performing Wi-Fi-based communication with other devices in the system 100 (e.g., the wireless access point 110). As described herein, it should be appreciated that the Wi-Fi circuitry 306 may be configured to operate in multiple power states. For example, in the illustrative embodiment, the Wi-Fi circuitry 306 is configured to operate in a normal power state and a low power sleep state that consumes less power than the normal power state. In other embodiments, it should be appreciated that the Wi-Fi circuitry 306 may be configured to operate in more than two power states (e.g., having multiple low power states). Although described herein by the same name for simplicity, it should be appreciated that the normal and low power sleep states of themain microprocessor 304 and the Wi-Fi circuitry 306 may be different power states, for example, having different levels of power consumption. Further, as indicated above, rather than forming separate circuitries, it should be appreciated that theBLE circuitry 302, themain microprocessor 304, and the Wi-Fi circuitry 306 may be composed/decomposed in another suitable physical configuration/combination in other embodiments. - Referring now to
FIG. 4 , in use, thesystem 100 may execute amethod 400 for communicating commands for theaccess control device 108 from themobile device 102 to theserver 106. It should be appreciated that the particular blocks of themethod 400 are illustrated by way of example, and such blocks may be combined or divided, added or removed, and/or reordered in whole or in part depending on the particular embodiment, unless stated to the contrary. Theillustrative method 400 begins withblock 402 in which themobile device 102 determines one or more commands and/or other access control data to be issued/sent to theaccess control device 108. It should be appreciated that the particular commands and/or access control data may vary depending on the particular embodiment. For example, the commands may include a command to unlock a lock mechanism of theaccess control device 108, lock a lock mechanism of theaccess control device 108, retrieve a firmware update for theaccess control device 108, retrieve updated access control permissions, retrieve updated access control schedules, and/or other suitable commands/data. Further, in some embodiments, themobile device 102 may determine or identify relevant credential data associated with a user of themobile device 102 and/or themobile device 102 itself. - In
block 404, themobile device 102 establishes a wireless communication connection with theserver 106 for transmission of the command(s) and/or access control data. It should be appreciated that the wireless communication connection may be established according to any suitable communication protocol and/or using any suitable networks (e.g., cellular communication, Internet-based communication, etc.). Inblock 406, themobile device 102 transmits the determined command(s) and/or access control data to theserver 106. Further, in some embodiments, it should be appreciated that theserver 106 may authenticate themobile device 102 and/or its user. Accordingly, themobile device 102 may transmit any relevant credential data, PIN data, and/or other authentication data, and themobile device 102 andserver 106 may execute a suitable authentication algorithm. It should be appreciated that, in some embodiments, one or more other wired and/or wireless techniques may be used to transmit commands to the server 106 (e.g., via web application, Postman, or another suitable technology or protocol). - In
block 408, theserver 106 stores the received command(s) and/or access control data in association with theaccess control device 108. For example, theserver 106 may utilize a database that stores the received command(s) and/or access control data and associates the stored data with the relevantaccess control device 108 such that it can be subsequently retrieved by theaccess control device 108 as described herein. - Although the blocks 402-408 are described in a relatively serial manner, it should be appreciated that various blocks of the
method 400 may be performed in parallel in some embodiments. Further, it should be appreciated that, in other embodiments, thesystem 100 may execute a different method for communicating commands for theaccess control device 108 to theserver 106. - Referring now to
FIGS. 5-6 , in use, thesystem 100 may execute amethod 500 for associating the Wi-Fi circuitry 306 of theaccess control device 108 with thewireless access point 110 and communicating access control data to theaccess control device 108. It should be appreciated that the particular blocks of themethod 500 are illustrated by way of example, and such blocks may be combined or divided, added or removed, and/or reordered in whole or in part depending on the particular embodiment, unless stated to the contrary. In the illustrative embodiment, themethod 500 is commenced when themain microprocessor 304 and the Wi-Fi circuitry 306 of theaccess control device 108 are in corresponding low power sleep states. - The
illustrative method 500 begins withblock 502 ofFIG. 5 in which theaccess control device 108 establishes a BLE connection with a mobile device 102 (e.g., themobile device 102 described in reference to themethod 400 ofFIG. 4 or a different mobile device 102). For example, amobile device 102 may come within BLE communication range of theaccess control device 108 and establish a “low-level” BLE connection with the access control device 108 (e.g., in response to a BLE advertisement). In particular, in the illustrative embodiment, the “low-level” BLE connection (e.g., via a “BLE Connect” function) may be an initial connection between themobile device 102 and theaccess control device 108 such that themobile device 102 can be an unpaired device (e.g., before any credential information is transmitted from themobile device 102 to the access control device 108). It should be appreciated that themobile device 102 that establishes the BLE connection with theaccess control device 108 may or may not be the same as, or related to, themobile device 102 that transmitted the command(s) and/or access control data to theserver 106 as described in reference to themethod 400 ofFIG. 4 . - In
block 504, theaccess control device 108 wakes its Wi-Fi circuitry 306 in response to the BLE connection. In particular, inblock 506, theBLE circuitry 302 of theaccess control device 108 causes (e.g., generates or sends) an interrupt to themain microprocessor 304 that wakes themain microprocessor 304 from the low power sleep state in the illustrative embodiment. In other words, themain microprocessor 304 transitions from the low power sleep state to the normal power state in response to the interrupt. Inblock 508, the illustrativemain microprocessor 304 determines that theBLE circuitry 302 has established a connection with another device (e.g., the mobile device 102) and, inblock 510, themain microprocessor 304 wakes the Wi-Fi circuitry 306 from the lower power sleep state. In particular, in some embodiments, themain microprocessor 304 may execute a “start function” that triggers the Wi-Fi circuitry 306 to transition from the low power sleep state to the normal power state. In other embodiments, theaccess control device 108 may otherwise wake its Wi-Fi circuitry 306 in response to the BLE connection. - In
block 512, theaccess control device 108 establishes a Wi-Fi communication connection with theserver 106 using the Wi-Fi circuitry 306. More specifically, theaccess control device 108 may establish a Wi-Fi communication connection/link with thewireless access point 110, which is communicatively coupled to the server 106 (e.g., over the Internet). - In
block 514, theaccess control device 108 requests any pending commands and/or other access control data from theserver 106 via the Wi-Fi communication connection. Theserver 106 determines whether it has stored thereon, or otherwise has access to, commands and/or other access control data associated with the requestingaccess control device 108. For example, theserver 106 may store such data in a database in association with the correspondingaccess control device 108 for simplified searching. - If the
server 106 determines, inblock 516 ofFIG. 6 , that it has stored thereon, or otherwise has access to, one or more commands and/or other access control data associated with the requestingaccess control device 108, themethod 500 advances to block 518 in which theserver 106 transmits a commands message to theaccess control device 108 via the Wi-Fi communication connection (e.g., via the connection between theserver 106 and thewireless access point 110 and further via the Wi-Fi connection between thewireless access point 110 and the access control device 108). It should be appreciated that the commands message may include the command(s) and/or access control data retrieved by the server 106 (e.g., received by themobile device 102 by virtue of themethod 400 ofFIG. 4 ). In some embodiments, the commands message may, additionally or alternatively, provide access instructions and/or directions for retrieving the relevant data from a particular source. As indicated above, it should be appreciated that the command(s) may include, for example, a command to unlock a lock mechanism of theaccess control device 108, lock a lock mechanism of theaccess control device 108, retrieve a firmware update for theaccess control device 108, retrieve updated access control permissions, retrieve updated access control schedules, and/or other suitable commands/data. As such, inblock 520, theaccess control device 108 may execute one or more commands associated with the commands message by performing the commanded function(s). Themethod 500 advances to block 522. - Similarly, if the
server 106 determines, inblock 516, that is does not have stored thereon, or otherwise have access to, any commands or access control data associated with the requestingaccess control device 108, themethod 500 advances to block 522 in which theaccess control device 108 is synchronized with theserver 106 via the Wi-Fi communication connection (e.g., via the Wi-Fi connection betweenaccess control device 108 and thewireless access point 110 and further via the connection between thewireless access point 110 and the server 106). In doing so, in some embodiments, theaccess control device 108 may determine whether it has audit data (e.g., security data, raw sensor data, usage data, and/or other relevant audit data) and/or other relevant data to transmit to theserver 106. For example, in some embodiments, theaccess control device 108 may transmit state data indicative of a current state of the access control device 108 (e.g., the current operational state of a lock mechanism and/or other component(s) of the access control device 108). Although the blocks 516-520 and theblock 522 are illustrated serially, it should be appreciated that those blocks may be performed in parallel in some embodiments. - In
block 524, theaccess control device 108 places the Wi-Fi circuitry 306 in the low power sleep state. Further, in some embodiments, theaccess control device 108 may also transition themain microprocessor 304 from the normal power state to the low power sleep state (e.g., subsequent to processing any relevant data associated with the method 500). - Although the blocks 502-524 are described in a relatively serial manner, it should be appreciated that various blocks of the
method 500 may be performed in parallel in some embodiments. - In some embodiments, it should be appreciated that the
access control device 108 may be triggered to wake up the Wi-Fi circuitry 306 and/or themain microprocessor 304 according to another mechanism. For example, in some embodiments, theaccess control device 108 may include a physical button, handle, or actuator that may be contacted by the user to wake up theaccess control device 108 components. In another embodiment, theaccess control device 108 may include a timer that will wake up with Wi-Fi circuitry 306 and/or themain microprocessor 304 after a predetermined period of time has lapsed. It should be appreciated that theaccess control device 108 may utilize multiple triggers in some embodiments. - According to an embodiment, a method includes establishing, by Bluetooth Low Energy (BLE) circuitry of an access control device, a BLE communication connection with a first mobile device while a main microprocessor and a Wi-Fi circuitry of the access control device are in sleep states, waking, by the access control device, the Wi-Fi circuitry of the access control device from the sleep state in response to establishing the BLE communication connection with the mobile device, establishing, by the Wi-Fi circuitry of the access control device, a Wi-Fi communication connection with an access control server in response to waking the Wi-Fi circuitry from the sleep state, and receiving, by the access control device and from the access control server via the Wi-Fi communication connection, access control data for the access control device transmitted from a second mobile device to the access control server. In some embodiments, waking the Wi-Fi circuitry of the access control device from the sleep state may include generating, by the BLE circuitry, an interrupt to the main microprocessor that wakes the main microprocessor from the sleep state in response to establishing the BLE connection with the first mobile device and waking, by the main microprocessor, the Wi-Fi circuitry in response to the interrupt. In some embodiments, establishing the Wi-Fi communication connection with the access control server may include establishing a Wi-Fi communication with a wireless access point that is communicatively coupled with the access control server over the Internet. In some embodiments, receiving the access control data may include transmitting, by the access control device and to the access control server, a request for pending access control commands associated with the access control device and receiving, by the access control device and from the access control server, at least one pending access control command stored in association with the access control device. In some embodiments, the at least one pending access control command may include a command to one of lock a lock mechanism of the access control device or unlock the lock mechanism of the access control device. In some embodiments, the method may further include executing, by the access control device, the at least one pending access control command. In some embodiments, the method may further include transmitting, by the access control device and to the access control server via the Wi-Fi communication connection, audit data associated with the access control device. In some embodiments, the method may further include placing the Wi-Fi circuitry in the sleep state in response to receiving the access control data from the access control server. In some embodiments, the method may further include transmitting, by the second mobile device, the access control data to the access control server via a wireless communication connection between the second mobile device and the access control server and storing, by the access control server, the access control data in association with the access control device. In some embodiments, the first mobile device may be different from the second mobile device. In some embodiments, the server may be executed in a cloud computing environment.
- According to another embodiment, an access control device includes a main microprocessor configured to operate in at least a first normal power state and a first sleep state, a Wi-Fi circuitry configured to operate in at least a second normal power state and a second sleep state, and a Bluetooth Low Energy (BLE) circuitry configured to establish a BLE communication connection with a first mobile device while the main microprocessor is in the first sleep state and the Wi-Fi circuitry is in the second sleep state and generate an interrupt to the main microprocessor that transitions the main microprocessor from the first sleep state to the first normal power state, wherein the main microprocessor is configured to transition the Wi-Fi circuitry from the second sleep state to the second normal power state in response to the interrupt, and the Wi-Fi circuitry is configured to establish a Wi-Fi communication connection with an access control server in response to transitioning to the second normal power state and receive access control data from the access control device transmitted from a second mobile device to the access control server. In some embodiments, to establish the Wi-Fi communication connection with the access control server may include to establish a Wi-Fi communication with a wireless access point that is communicatively coupled with the access control server over the Internet. In some embodiments, to receive the access control data may include to transmit a request for pending access control commands associated with the access control device to the access control server and receive at least one pending access control command stored in association with the access control device from the access control server. In some embodiments, the access control device may further include an electronic lock mechanism adapted to move between a locked position and an unlocked position, and the at least one pending access control command may include a command to one of move the electronic lock mechanism to the locked position or move the electronic lock mechanism to the unlocked position. In some embodiments, the main microprocessor may be configured to execute the at least one pending access control command. In some embodiments, the Wi-Fi circuitry may return to the sleep state in response to receipt of the access control data from the access control server.
- According to yet another embodiment, an access control system includes an access control server and an access control device having a main microprocessor configured to operate in at least a first normal power state and a first sleep state, a Wi-Fi circuitry configured to operate in at least a second normal power state and a second sleep state, and a Bluetooth Low Energy (BLE) circuitry configured to establish a BLE communication connection with a first mobile device while the main microprocessor is in the first sleep state and the Wi-Fi circuitry is in the second sleep state and generate an interrupt to the main microprocessor that wakes the main microprocessor from the first sleep state to the first normal power state, wherein the main microprocessor is configured to wake the Wi-Fi circuitry from the second sleep state to the second normal power state in response to the interrupt and the Wi-Fi circuitry is configured to establish a Wi-Fi communication connection with the access control server in response to entering the second normal power state and receive access control data from the access control device transmitted from a second mobile device to the access control server. In some embodiments, the access control system may further include the second mobile device, wherein the second mobile device may be configured to transmit the access control data to the access control server via a wireless communication connection between the second mobile device and the access control server, and the access control server may be configured to store the access control data in association with the access control device. In some embodiments, the first mobile device may be different from the second mobile device.
Claims (21)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/223,842 US11375455B2 (en) | 2019-03-29 | 2021-04-06 | Technologies for associating an offline Wi-Fi system with a wireless access point |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/369,916 US10548084B1 (en) | 2019-03-29 | 2019-03-29 | Technologies for associating an offline Wi-Fi system with a wireless access point |
US16/774,713 US10972979B2 (en) | 2019-03-29 | 2020-01-28 | Technologies for associating an offline Wi-Fi system with a wireless access point |
US17/223,842 US11375455B2 (en) | 2019-03-29 | 2021-04-06 | Technologies for associating an offline Wi-Fi system with a wireless access point |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/774,713 Continuation US10972979B2 (en) | 2019-03-29 | 2020-01-28 | Technologies for associating an offline Wi-Fi system with a wireless access point |
Publications (2)
Publication Number | Publication Date |
---|---|
US20220060983A1 true US20220060983A1 (en) | 2022-02-24 |
US11375455B2 US11375455B2 (en) | 2022-06-28 |
Family
ID=69179952
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/369,916 Active US10548084B1 (en) | 2019-03-29 | 2019-03-29 | Technologies for associating an offline Wi-Fi system with a wireless access point |
US16/774,713 Active US10972979B2 (en) | 2019-03-29 | 2020-01-28 | Technologies for associating an offline Wi-Fi system with a wireless access point |
US17/223,842 Active US11375455B2 (en) | 2019-03-29 | 2021-04-06 | Technologies for associating an offline Wi-Fi system with a wireless access point |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/369,916 Active US10548084B1 (en) | 2019-03-29 | 2019-03-29 | Technologies for associating an offline Wi-Fi system with a wireless access point |
US16/774,713 Active US10972979B2 (en) | 2019-03-29 | 2020-01-28 | Technologies for associating an offline Wi-Fi system with a wireless access point |
Country Status (5)
Country | Link |
---|---|
US (3) | US10548084B1 (en) |
EP (1) | EP3949362A4 (en) |
AU (1) | AU2020253306B2 (en) |
CA (1) | CA3132133C (en) |
WO (1) | WO2020205748A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102540090B1 (en) * | 2018-03-06 | 2023-06-05 | 삼성전자주식회사 | Electronic device and method for managing electronic key thereof |
US10548084B1 (en) * | 2019-03-29 | 2020-01-28 | Schlage Lock Company Llc | Technologies for associating an offline Wi-Fi system with a wireless access point |
US11447983B1 (en) | 2021-09-23 | 2022-09-20 | George Condorodis | Door and window securing apparatus and method |
US11898376B2 (en) | 2021-09-23 | 2024-02-13 | George Condorodis | Door and window securing apparatus and method |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180048750A1 (en) * | 2012-06-15 | 2018-02-15 | Muzik, Llc | Audio/video wearable computer system with integrated projector |
AU2013302374B2 (en) * | 2012-08-16 | 2017-01-05 | Schlage Lock Company Llc | Wireless reader system |
US9307490B2 (en) * | 2012-11-30 | 2016-04-05 | Mediatek Inc. | Method for controlling bluetooth device for power conservation |
KR20140124304A (en) * | 2013-04-16 | 2014-10-24 | 삼성전자주식회사 | Controlling Method for Communication and Electronic Device supporting the same |
GB2516686B (en) * | 2013-07-30 | 2018-02-07 | Paxton Access Ltd | Communication method and system |
KR102306804B1 (en) * | 2015-01-21 | 2021-09-30 | 삼성전자주식회사 | Method and apparatus for reducing power consumption of electronic device |
US20160353382A1 (en) * | 2015-05-27 | 2016-12-01 | Qualcomm Incorporated | Low energy wireless network applications |
US9656621B2 (en) * | 2015-09-14 | 2017-05-23 | Pearl Automation Inc. | System and method for sensor module power management |
KR102447179B1 (en) * | 2015-11-19 | 2022-09-26 | 삼성전자 주식회사 | Method for wireless communication and electronic device supporting the same |
US10521736B2 (en) * | 2015-12-22 | 2019-12-31 | GM Glboal Technology Operations LLC | Ride sharing accessory device and system |
US9888350B2 (en) * | 2015-12-22 | 2018-02-06 | Intel IP Corporation | System, method and apparatus for hybrid wireless fine-timing measurement |
KR102443063B1 (en) * | 2016-05-10 | 2022-09-14 | 삼성전자주식회사 | Apparatus and method for providing low power mobile hotspot |
US10484941B2 (en) * | 2016-07-25 | 2019-11-19 | Apple Inc. | Wake-up radio assisted WLAN power saving technologies |
US9913216B1 (en) * | 2016-09-02 | 2018-03-06 | Qualcomm, Incorporated | Techniques to reduce power consumption in mobile device during low-power mode |
US20180084588A1 (en) * | 2016-09-16 | 2018-03-22 | Microsoft Technology Licensing, Llc | Managing Automatic Connections to a Wireless Dock |
KR102429535B1 (en) * | 2017-09-26 | 2022-08-05 | 삼성전자주식회사 | Method for registration of internet of things deivce and the appratus thereof |
US10548084B1 (en) * | 2019-03-29 | 2020-01-28 | Schlage Lock Company Llc | Technologies for associating an offline Wi-Fi system with a wireless access point |
-
2019
- 2019-03-29 US US16/369,916 patent/US10548084B1/en active Active
-
2020
- 2020-01-28 US US16/774,713 patent/US10972979B2/en active Active
- 2020-03-30 CA CA3132133A patent/CA3132133C/en active Active
- 2020-03-30 WO PCT/US2020/025740 patent/WO2020205748A1/en unknown
- 2020-03-30 EP EP20782981.3A patent/EP3949362A4/en active Pending
- 2020-03-30 AU AU2020253306A patent/AU2020253306B2/en active Active
-
2021
- 2021-04-06 US US17/223,842 patent/US11375455B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
CA3132133C (en) | 2023-10-17 |
WO2020205748A1 (en) | 2020-10-08 |
US10972979B2 (en) | 2021-04-06 |
US20200314753A1 (en) | 2020-10-01 |
AU2020253306B2 (en) | 2022-10-06 |
US10548084B1 (en) | 2020-01-28 |
CA3132133A1 (en) | 2020-10-08 |
EP3949362A4 (en) | 2022-12-21 |
AU2020253306A1 (en) | 2021-11-25 |
EP3949362A1 (en) | 2022-02-09 |
US11375455B2 (en) | 2022-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11375455B2 (en) | Technologies for associating an offline Wi-Fi system with a wireless access point | |
US10217304B2 (en) | Intelligent vehicular electronic key system | |
US11388595B2 (en) | Wireless access credential system | |
US20200348719A1 (en) | Secure real-time clock update in an access control system | |
US20170134943A1 (en) | Secure wireless low-power wake-up | |
US9019878B2 (en) | Phone supporting mode conversion | |
US20160128112A1 (en) | Access control in bluetooth® low energy devices | |
US20140334364A1 (en) | Remote wake-up system and method | |
JP2013520745A (en) | Agentless follow-me service for cloud-based applications | |
WO2023283484A2 (en) | Ultra-wideband accessory devices for radio frequency intent detection in access control systems | |
US10952077B1 (en) | Technologies for access control communications | |
US20110280167A1 (en) | Wireless personal area network coordinator | |
WO2016177171A1 (en) | Control method and apparatus for wireless access point device | |
US20230140108A1 (en) | Managing unlock and disconnect events between connected devices | |
US11758396B2 (en) | Bluetooth device authentication over Bluetooth advertisements | |
US11594088B2 (en) | Access control for emergency responders | |
JP4852586B2 (en) | Communication device and data synchronization method | |
WO2019104989A1 (en) | Terminal and communication method | |
US20230006861A1 (en) | Access control embedded into network gear | |
JP5969399B2 (en) | Wireless access point for starting communication by signal using dummy identifier, communication starting program and method | |
US20230162551A1 (en) | Technologies for using nfc or qr code to commission a device to the cloud | |
US11487345B2 (en) | Technologies for reducing power consumption in access control devices based on delivery scheduling | |
TW201610659A (en) | Remote power control system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: SCHLAGE LOCK COMPANY LLC, INDIANA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VENKATESWARAN, SRIKANTH;GOODRICH, JOHN;BATY, DAVID M.;AND OTHERS;SIGNING DATES FROM 20190702 TO 20190923;REEL/FRAME:058563/0885 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP., ISSUE FEE NOT PAID |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |